服务计算技术与系统教育部重点实验室 (SCTS) 集群与网格计算湖北省重点实验室 (CGCL) CFCC: Covert Flows Confinement For VM Coalitions Ge Cheng, Hai Jin, Deqing Zou, Lei Shi, and Alex K. Ohoussou.

Slides:



Advertisements
Similar presentations
Wei Lu 1, Kate Keahey 2, Tim Freeman 2, Frank Siebenlist 2 1 Indiana University, 2 Argonne National Lab
Advertisements

Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
The Who, What, Why and How of High Performance Computing Applications in the Cloud Soheila Abrishami 1.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
KMemvisor: Flexible System Wide Memory Mirroring in Virtual Environments Bin Wang Zhengwei Qi Haibing Guan Haoliang Dong Wei Sun Shanghai Key Laboratory.
1 Week #1 Objectives Review clients, servers, and Windows network models Differentiate among the editions of Server 2008 Discuss the new Windows Server.
Towards High-Availability for IP Telephony using Virtual Machines Devdutt Patnaik, Ashish Bijlani and Vishal K Singh.
VMware Infrastructure Alex Dementsov Tao Yang Clarkson University Feb 28, 2007.
Virtualization for Cloud Computing
Virtual Network Servers. What is a Server? 1. A software application that provides a specific one or more services to other computers  Example: Apache.
VMware vCenter Server Module 4.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 3 Desktop Virtualization McGraw-Hill.
1 Virtualization Services. 2 Cloud Hosting –Shared Virtual Servers –Dedicated Servers Managed Server Options Multiple Access Methods –EarthLink Business.
Getting Started with Oracle Compute Cloud
11 World-Leading Research with Real-World Impact! A Formal Model for Isolation Management in Cloud Infrastructure-as-a-Service Khalid Zaman Bijon, Ram.
Measuring zSeries System Performance Dr. Chu J. Jong School of Information Technology Illinois State University 06/11/2012 Sponsored in part by Deer &
The Glasgow Raspberry Pi Cloud: A Scale Model for Cloud Computing Infrastructures By: Mugasa Hatwib.
WP6: Grid Authorization Service Review meeting in Berlin, March 8 th 2004 Marcin Adamski Michał Chmielewski Sergiusz Fonrobert Jarek Nabrzyski Tomasz Nowocień.
Abstract Cloud data center management is a key problem due to the numerous and heterogeneous strategies that can be applied, ranging from the VM placement.

 Cloud computing  Workflow  Workflow lifecycle  Workflow design  Workflow tools : xcp, eucalyptus, open nebula.
Department of Computer Science Engineering SRM University
Virtual Machine Hosting for Networked Clusters: Building the Foundations for “Autonomic” Orchestration Based on paper by Laura Grit, David Irwin, Aydan.
Jakub Szefer, Eric Keller, Ruby B. Lee Jennifer Rexford Princeton University CCS October, 2011 報告人:張逸文.
NICE :Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Enabling Technologies for Distributed and Cloud Computing Dr. Sanjay P. Ahuja, Ph.D FIS Distinguished Professor of Computer Science School of.
Dynamic Resource Allocation Using Virtual Machines for Cloud Computing Environment.
Auditing Cloud Administrators Using Information Flow Tracking Afshar David ACM Scalable Trusted Computing.
Guanhai Wang, Minglu Li and Chuliang Weng Shanghai Jiao Tong University, China. SVM09, Wuhan, China.
Appendix B Planning a Virtualization Strategy for Exchange Server 2010.
Privacy-Preserving Public Auditing for Secure Cloud Storage
Virtual Machine Scheduling for Parallel Soft Real-Time Applications
Benefits: Increased server utilization Reduced IT TCO Improved IT agility.
DiProNN Resource Management System (DiProNN = Distributed Programmable Network Node) Tomáš Rebok Faculty of Informatics MU, Brno Czech.
Improving Network I/O Virtualization for Cloud Computing.
Virtualization for Adaptability Project Presentation CS848 Fall 2006 Umar Farooq Minhas 29 Nov 2006 David R. Cheriton School of Computer Science University.
Politecnico di Torino Dipartimento di Automatica ed Informatica TORSEC Group Performance of Xen’s Secured Virtual Networks Emanuele Cesena Paolo Carlo.
Identity-Based Secure Distributed Data Storage Schemes.
Enabling Dynamic Data and Indirect Mutual Trust for Cloud Computing Storage Systems.
RESOURCE MANAGEMENT FOR ISOLATION ENHANCED CLOUD SERVICES Presented by: Yun Liaw Ripal Nathuji Abhishek SinghPaul England ACM Workshop on Cloud Computing.
Power-Aware Scheduling of Virtual Machines in DVFS-enabled Clusters
Privacy Preserving Delegated Access Control in Public Clouds.
© 2004 IBM Corporation IBM ^ z/VM Design considerations > Security > Performance (SIE)
0 Penn State, NSRC Industry Day, Trent Jaeger – Past Projects and Results Linux Security –Aim to Build Measurable, High Integrity Linux Systems.
Module 4 Planning for Group Policy. Module Overview Planning Group Policy Application Planning Group Policy Processing Planning the Management of Group.
Participatory Privacy: Enabling Privacy in Participatory Sensing
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
SDN Management Layer DESIGN REQUIREMENTS AND FUTURE DIRECTION NO OF SLIDES : 26 1.
Design Issues of Prefetching Strategies for Heterogeneous Software DSM Author :Ssu-Hsuan Lu, Chien-Lung Chou, Kuang-Jui Wang, Hsiao-Hsi Wang, and Kuan-Ching.
m-Privacy for Collaborative Data Publishing
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Enabling Technologies for Distributed Computing Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing,
Technical Reading Report Virtual Power: Coordinated Power Management in Virtualized Enterprise Environment Paper by: Ripal Nathuji & Karsten Schwan from.
Multiparty Access Control for Online Social Networks : Model and Mechanisms.
Harnessing the Cloud for Securely Outsourcing Large- Scale Systems of Linear Equations.
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
3/12/2013Computer Engg, IIT(BHU)1 PARALLEL COMPUTERS- 1.
Whole Test Suite Generation. Abstract Not all bugs lead to program crashes, and not always is there a formal specification to check the correctness of.
Load Rebalancing for Distributed File Systems in Clouds.
Computer Science Infrastructure Security for Virtual Cloud Computing Peng Ning 04/08/111BITS/ Financial Services Roundtable Supported by the US National.
Virtualization for Cloud Computing
Hardware-rooted Trust for Secure Key Management & Transient Trust
Hybrid Cloud Architecture for Software-as-a-Service Provider to Achieve Higher Privacy and Decrease Securiity Concerns about Cloud Computing P. Reinhold.
XACML and the Cloud.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
Outline Midterm results summary Distributed file systems – continued
Cloud-Enabling Technology
Shielding applications from an untrusted cloud with Haven
NSA Security-Enhanced Linux (SELinux)
Presentation transcript:

服务计算技术与系统教育部重点实验室 (SCTS) 集群与网格计算湖北省重点实验室 (CGCL) CFCC: Covert Flows Confinement For VM Coalitions Ge Cheng, Hai Jin, Deqing Zou, Lei Shi, and Alex K. Ohoussou

Outline Background  Cloud and Virtualization  Problems Statement Design  Requirement  Architecture  Algorithm Implementation and Experiment  Performance Conclusion and Further work

Background(Cloud and Virtualization) Cloud computing currently emerges as a hot topic due to its abilities to enable companies to cut costs by outsourcing computations on-demand

Background(Cloud and Virtualization) Many cloud provider take Virtualization technology as the infrastructure, such as Elastic Compute Cloud of Amazon, Blue Cloud of IBM. So it is natural that resources in those cloud computing environment are allocated in VM granularity for cloud users.

Background(Problem Statement) Although multiple VMs on the same hardware platform offer great benefits, it also raises the risk of information leakage between VMs belonging to different companies which may compete with each other. Enforcing MAC between VMs provides an attractive mechanism to improve the security of VM based cloud computing. Dynamic coalitions, also called domains in some papers, are used to organize VMs over nodes, and security policies differ in each coalition normally.

Background(Problem Statement) There are many VM coalition building approaches, which have been proposed in distributed VM systems, such as NetTop, Shamon, and Trusted Virtual Domain. Shamon Trusted Virtual Domain

Background(Problem Statement) However the existing VM coalition systems cannot eliminate covert channel, which are not the mechanism designed for implicitly communication controlling between VMs. For example, if both two VMs have the access to a disk, they may use it as a covert channel by controlling the exhaustion of the disk’s storage space. Although overt communication channels are enforced by explicit authorizations and we have some tools to check comprehensive coverage of authorizations to these channels, covert channels are difficult to identify and perhaps impossible to eliminate completely.

Background(Problem Statement) To address the above questions, we propose a covert flows confinement mechanism for VM coalitions (CFCC) in VM-based cloud computing. CFCC uses an effective but simplified alternative of the prioritized Chinese-Wall model[1], with a mandatory access control mechanism for all communication, migration, startup of VMs without changing current MAC policies inside the coalitions. Enforcing MAC to managing the covert flows by CFCC is not to eliminate covert channels by rewriting of hypervisor code but  (i) to prevent the covert flow through careful resource management.  (ii)to enable users through configuration options to mitigate covert channels [1]Cheng, G., Jin, H., Zhou, D., Ohoussou, A.K., Zhao, F.: A Prioritized Chinese Wall Model for Managing the Covert Information Flows in Virtual Machine Systems. In: 9th International Conference for Young Computer Scientists, pp IEEE Press, Hunan (2008)

Design(Design Requirement ) We use the conflicts of interest set of Chinese-Wall policy to describe the requirement of covert flows confinement between two VMs. The coalitions will be dynamically constructed. Both the subjects and objects of the Chinese-Wall policies used in our mechanism are VMs. A label defined by the system administrator is attached to a VM, and the following information flows between label-attached VMs will be controlled.  1) covert information flows between label-attached VMs whose labels are the same are permitted;  2) covert information flows between label-attached VMs whose labels belong to different conflicts of interest set are permitted;  3) covert information flows between label-free VMs are permitted;  4) covert information flows between label-attached VMs whose labels belong to the same conflicts of interest set are disallowed.

Design(Design Requirement ) The Chinese-Wall model is history-based, which needs to have the knowledge of the current system state to make decisions. Two features are needed in our architecture: distributed mandatory access control for all VMs and centralized information exchange. Both need to be implemented simultaneously based on the activity history of VMs.

Design(Architecture) System Architecture of CFCC

Design(Algorithm )

Design(Case) A scenario of covert flows confinement

Experiment (Performance) Overhead of VMs startup in a single-node Synchronization overhead we implement a prototype, which consists of 4 machines connected with a 1000Mbit Ethernet. Three nodes used is a 2.33 GHz Intel Core Duo processor with 2 MB L2 cache, 2 GB RAM and an 80 GB 7200 RPM disk. The OSS is Pentium 4 machine with 2GHz, 2GB RAM and Federal Linux installed.

Conclusions and Future Work Our contribution aims to provide a mechanism to confine the covert flows (CFCC) which become a problem for VM- based cloud computing environments even enforced with mandatory access control (MAC). Enforcing MAC to managing the covert flows by CFCC is  (i) to prevent the covert flow through careful resource management.  (ii)to enable users through configuration options to mitigate covert channels Experimental results show that the performance overhead is acceptable. In our future work, we plan to add application level information flows control for virtual machine coalitions.

Thank You! Any Question?